19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4 Branch Router <strong>QoS</strong> <strong>Design</strong><br />

NBAR Versus Sasser<br />

Version 3.3<br />

Branch Router LAN Edge <strong>QoS</strong> <strong>Design</strong><br />

By default, the NBAR exchange PDLM is mapped to TCP port 135; therefore, this PDLM can be used<br />

as part of the MS Blaster worm policy definition. Similarly, the NBAR netbios PDLM is bound by<br />

default to TCP/UDP port 139 (in addition to TCP port 137 and UDP ports 137 and 138), so this PDLM<br />

also can be used within the policy definition; specifically, the netbios PDLM can have its port mapping<br />

expanded to include TCP port 445 and UDP ports 135, 139, and 445, as shown in Example 4-15.<br />

Note Alternatively, a custom PDLM can be defined for these ports (TCP/UDP 135, 139, and 445), but before<br />

this could be done, you would have to map the exchange and netbios PDLMs ports away from their<br />

defaults, to avoid conflicting PDLM port mappings.<br />

Example 4-15 NBAR Policies to Identify RPC DCOM/W32/MS Blaster<br />

!<br />

ip nbar port-map netbios tcp 137 139 445 ! Matches TCP 137/139/445<br />

ip nbar port-map netbios udp 135 137 138 139 445 ! Matches UDP 135/137-139/445<br />

!<br />

class-map match-any MS-BLASTER<br />

match protocol exchange ! Matches TCP port 135<br />

match protocol netbios ! Matches MS Blaster NetBIOS PDLM<br />

!<br />

Verification commands:<br />

show policy<br />

show ip nbar port-map<br />

The next major worm after MS Blaster was the Sasser worm (and variants Sasser.A/B/C/D), which was released<br />

in late April 2004. Sasser exploits a flaw in the Windows Local Security Authority Service Server<br />

(LSASS) that can cause systems to crash and continually reboot, or allow a remote attacker to execute<br />

arbitrary code with local system privileges.<br />

Sasser is very efficient in scanning: It can scan 1024 separate IP addresses simultaneously (on TCP port<br />

445). When scanning reveals a vulnerable system, the worm exploits the LSASS vulnerability and<br />

creates a remote shell (RSH) session on TCP port 9996 back to the infecting system. Then Sasser starts<br />

an FTP server on TCP port 5554 to retrieve a copy of the worm.<br />

Sasser can be identified through a custom NBAR PDLM listening for communication on TCP ports 445,<br />

5554, and 9996, as shown in Example 4-16.<br />

Note If TCP port 445 already has been bound to the netbios NBAR PDLM (as recommended previously in<br />

the MS Blaster worm definition), it is not necessary to include this port in the Sasser custom PDLM port<br />

mapping (because it will cause a conflict).<br />

Example 4-16 NBAR Policies to Identify Sasser<br />

!<br />

ip nbar port-map custom-03 tcp 445 5554 9996 ! Matches on TCP 445/5554/9996<br />

!<br />

class-map match-all SASSER<br />

match protocol custom-03 ! Matches Sasser custom PDLM<br />

!<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

4-19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!